About

Information Technology Security Analyst

What is security? Security is a process that often attempts to be independent of humans, trying to avoid human error. However, security requires human intervention along with the tools necessary for defense in depth...a layered security approach. InfoSec personnel should have an infinite love for security, willingness to learn, a forever curiousity of things, hacking to learn whilst learning to hack, breaking things, tinkerers, studiers, observers, the unsung heroes generating no revenue, yet keeping everyone employed

  • Design
  • Mobile
  • Film
  • Photo

Experience

Security

Security tools Rapid7 Nexpose/Metasploit, NMAP, Network Detective, Splunk, Enterprise AV products, RSA tokens, SAGAN SIEM, Incapsula, OpenDNS (now part of Cisco's Umbrella), Kali Linux and other Linux distros, WiFi scanners, VPN tunneling software, Network Detective's Security, Microsoft Baseline Scanner, Qualys external quarterly scans, keyloggers, employee monitoring software, screenshots/video/keycaptures and more

Networks

Windows networks 3.11 for Workgroups - Windows 2016, Netware 3x - 4x, VMware, Exchange 5.0 - 2013, SQL 2000/2005/2008/2012, Microsoft DOS/Win 3.x/95/98/ME/NT/Win2k/XP/Vista/07/08/10, backup solutions tape, disk/CDPs (continuous data protection), DATTO, Seagate Backup Exec, Norton Backup Exec, Lasso Logic/SonicWall, Acronis, Barracuda, ArcServe, switches, HP/Dell/IBM/Cobalt servers, Linux distros, remote control and management tools Citrix, Auvik, LabTech, TeamViewer, LogMeIn, ConnectWise, managed services software LabTech, Kaseya, PulseWay, troubleshooting tools SolarWinds, Sniffer Pro, Auvik and many more

Environments

  • Federal Government, Department of Defense Defense Logistics Agency
  • State: OES - Governor's Office of Emergency Services
    • OES - Department of Forestry
    • OES - Sacramento Job Corps
    • OES - California Conservation Corps
    • OES - Governor's Office (downtown)
  • State: Department of Water Resources
  • State: California Department of Child Services
  • State: California Department of Corrections CA Health Care Facility
  • Franklin Templeton
  • First Franklin Financial
  • Barclays Global
  • Bank of America
  • Wells Fargo Data Center Roseville
  • Intel Corp Folsom, CA and Santa Clara, CA
  • HP Data Center Rocklin, CA
  • State: Department of Motor Vehicles

Hobbies

Connect

Name Email Message

"Relying on the government to protect your privacy is like asking a peeping tom to install your window blinds."
- John Perry Barlow

In a relatively short time we've taken a system built to resist destruction by nuclear weapons and made it vulnerable to toasters.
— Jeff Jarmoc

"You'll hear companies say, 'I've never been hacked,' when what they really mean is, 'I've never detected that I've been hacked"
- Bruce Schneier

“If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.”
– Bruce Schneier

“Ransomware is more about manipulating vulnerabilities in human psychology than the adversary's technological sophistication”
- James Scott

“Ransomware is unique among cybercrime because in order for the attack to be successful, it requires the victim to become a willing accomplice after the fact”
― James Scott